Ross Anderson is Professor of Security Engineering at Cambridge University. He has worked in many fields, from cryptography through protocol analysis, hardware and peer-to-peer systems, to the economics of information security.
Senior Lecturer in the Security Group, best known for his book Security for Ubiquitous Computing and for his contributions to ubicomp authentication, including the Resurrecting Duckling. His research interests include location privacy, security and usability, privacy in the electronic society, RFID and Bluetooth, as well as ubicomp visualization and 4G wireless networks. He holds 3rd dan in kendo (Japanese swordsmanship) and leads the dojo of the University of Cambridge.
Mike Bond joined the security group as a Phd student in 2000, studying the security of cryptographic APIs. He is currently a research associate at the CL, and his particular interests are Trusted Computing, the EMV electronic payment system, formal analysis of Security APIs, and API security of online games. He works in the “War Room”, and once claimed that the only way to understand the wheel was to reinvent it.
I am a Senior Research Associate in the Security Research Group at the University of Cambridge Computer Laboratory; I am also a Research Fellow at St John's College Cambridge. My research interests include operating system security and networking, the hardware-software interface, and program analysis and transformation. I earned my PhD in computer science at the Computer Laboratory through 2010, supervised by Professor Ross Anderson. Prior to that, I worked for six years in a series of industry research labs investigating operating systems, networking, and security; my contributions included widely used work in operating system security extensibility, the topic of my later PhD dissertation. My undergraduate degree is in Logic and Computation, with a double major in Computer Science at Carnegie Mellon University. I have strong interests in open source software, am on the board of directors of the FreeBSD Foundation, and have contributed extensively to the FreeBSD Project.
PhD student in the Security Group focusing on RFID systems.
Tyler Moore is an assistant professor of computer science and engineering at Southern Methodist University in Dallas, TX. Moore’s research interests include the economics of information security, the study of electronic crime, and the development of policy for strengthening security. Moore completed his PhD in Computer Science at the University of Cambridge (UK), supervised by Ross Anderson. His PhD thesis investigated cooperative attack and defense in the design of decentralized wireless networks and through empirical analysis of phishing attacks on the Internet. Moore has co-authored a report for the European Union detailing policy recommendations for overcoming failures in the provision of information security. As an undergraduate, he studied at the University of Tulsa, identifying several vulnerabilities in the public telephone network’s underlying signaling protocols. Moore’s PhD studies were supported by a British Marshall Scholarship and US National Science Foundation Graduate Research Fellowship.
Interested in security of reconfigurable systems and banking systems.
Joseph Bonneau completed his PhD in the security group, supervised by Ross Anderson. His interests include security and privacy in social networks, human cryptographic protocols, side channel attacks, and reverse engineering.
Joined Security Group as a PhD student in April 2004. Research interests include biometrics, cryptography and information retrieval.
Researcher in the Security Group of the University of Cambridge, based in the Computer Laboratory. His research interests include covert channels and their analysis, the secure storage access to jointly-administered structured data, information security, anonymity and software engineering. Previous projects he has worked on include reverse engineering the Luna CA3 cryptographic co-processor, investigation of covert channels as a collusion mechanism in games and using covert channel analysis techniques to find weaknesses in the Tor anonymity system.
Research student in the Security Group of the Computer Lab from 2003. He is interested in the security aspects of complex networks, with a focus on traffic analysis, evolution of conflict, robustness and social network analysis.
Has been a Lecturer with the Computer Laboratory since 2001. Particular interests include the electrical-engineering end of computer security, digital signal processing, operating systems and distributed systems.
Expert on information security and applied cryptography, IT system architectures, embedded C programming, director of Smart Architects (www.smartarchitects.co.uk). Practical experience with software and hardware products (smart cards, hardware security modules, COTS systems) and implementations - design, testing, devising attacks and defences. More than ten years of academic experience. Two years' experience in analysing security and crypto architectures of large banking information systems (Swift, card payment processing, Faster Payments, IBM key management systems - DKMS) and PKI.
Cambridge Security group member from 2000 to 2005, I specialised in anonymous communications and traffic analysis. Now working in COSIC, K.U.Leuven (Belgium).
I am a Ph.D. student in the Security Group, supervised by Ross Anderson. The topic of my thesis is the economics of information security, and my current research interests include game-theoretic modelling of attacker behaviour, and effort metrics for reverse engineering and vulnerability discovery.